M. P. Nerkar

Learn More
— In this era due to unbelievable development in internet, various online attacks has been increased. From all such attacks most popular attack is phishing. This attacks are done for extracting confidential information such as banking information, passwords from unsuspecting victims for fraud purposes. Confidential data can't be directly uploaded on website(More)
— With the advent of internet, various online attacks has been increased. In this paper we are using visual cryptography algorithm for separating privileges. It is risky to upload confidential data directly on the cloud hence we are implementing video watermarking algorithm. Here combination of VCS and Video Watermarking gives enhanced security to our(More)
Database are growing very fast and becoming more complex in the volume (terabyte to petabyte), variety (structured, un-structured and hybrid), and velocity (high speed in growth). Management of database (BigData, so nomenclature) has become the global challenge. The data collection is currently managed and exploited mostly by using conventional data(More)
  • 1